Fortinet has disclosed a critical vulnerability (CVE-2025-25256) in its FortiSIEM product that is actively being exploited in the wild. The flaw, which has a CVSS score of 9.8, allows unauthenticated attackers to execute arbitrary code via crafted command-line interface requests, potentially leading to silent compromise without clear signs of intrusion. The company has warned users to update their systems promptly to mitigate the risk. Concurrently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical vulnerabilities in N-able's N-central remote monitoring and management (RMM) tool to its Known Exploited Vulnerabilities catalog. These flaws permit command execution and have been exploited in recent attacks targeting on-premises N-central environments. N-able has confirmed limited exploitation of these vulnerabilities and released patches, urging users to apply them by August 20 to prevent system takeover. Additionally, CISA has included vulnerabilities in Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR in its catalog. The cybersecurity community continues to monitor these developments amid a broader context of emerging threats, including new Android malware waves and expanded use of CrossC2 to extend Cobalt Strike Beacon capabilities to Linux and macOS platforms.
N‑able Confirms ‘Limited’ Exploitation Of N‑central RMM Vulnerabilities: https://t.co/phMn0vi4MT Patches are available for the two critical-severity flaws impacting on-premises N‑central environments, which have been exploited in recent attacks, N‑able said today.
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS: https://t.co/4hVuWPehmJ by The Hacker News #infosec #cybersecurity #technology #news
An OS command injection vulnerability in FortiSIEM has been observed exploited in the wild, according to @Fortinet. The bug could let unauthenticated hackers execute unauthorized code or commands via crafted CLI request. #cybersecurity #infosec https://t.co/pIUvaxIvS8